Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
argv vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-3192
Certain run-time memory protection mechanisms in the GNU C Library (aka glibc or libc6) print argv[0] and backtrace information, which might allow context-dependent malicious users to obtain sensitive information from process memory by executing an incorrect program, as demonstra...
Gnu Glibc
1 Github repository
9.8
CVSSv3
CVE-2017-9430
Stack-based buffer overflow in dnstracer up to and including 1.9 allows malicious users to cause a denial of service (application crash) or possibly have unspecified other impact via a command line with a long name argument that is mishandled in a strcpy call for argv[0]. An exam...
Dnstracer Project Dnstracer
2 EDB exploits
3 Github repositories
8.8
CVSSv3
CVE-2019-12181
A privilege escalation vulnerability exists in SolarWinds Serv-U prior to 15.1.7 for Linux.
Solarwinds Serv-u Mft Server
Solarwinds Serv-u Ftp Server
3 EDB exploits
2 Github repositories
7.8
CVSSv3
CVE-2023-6246
A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when the openlog function was not called, or called with the ident argument set to NULL, and the program ...
Gnu Glibc
Fedoraproject Fedora 38
Fedoraproject Fedora 39
1 Github repository
1 Article
NA
CVE-2024-29895
Cacti provides an operational monitoring and fault management framework. A command injection vulnerability on the 1.3.x DEV branch allows any unauthenticated user to execute arbitrary command on the server when `register_argc_argv` option of PHP is `On`. In `cmd_realtime.php` lin...
3 Github repositories
NA
CVE-2008-5983
Untrusted search path vulnerability in the PySys_SetArgv API function in Python 2.6 and previous versions, and possibly later versions, prepends an empty string to sys.path when the argv[0] argument does not contain a path separator, which might allow local users to execute arbit...
Python Python
Fedoraproject Fedora 13
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 10.04
NA
CVE-2024-24576
Rust is a programming language. The Rust Security Response WG was notified that the Rust standard library prior to version 1.77.2 did not properly escape arguments when invoking batch files (with the `bat` and `cmd` extensions) on Windows using the `Command`. An attacker able to ...
13 Github repositories
2 Articles
NA
CVE-2003-1450
BitchX 75p3 and 1.0c16 up to and including 1.0c20cvs allows remote malicious users to cause a denial of service (segmentation fault) via a malformed RPL_NAMREPLY numeric 353 message.
Bitchx Bitchx 1.0 C16
Bitchx Bitchx 1.0 C19
Bitchx Bitchx 1.0 C20cvs
Bitchx Bitchx 75p3
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3